Which protocol does an access point use to draw power from a connected switch?
Which protocol does an access point use to draw power from a connected switch?A . Internet Group Management ProtocolB . Cisco Discovery ProtocolC . Adaptive Wireless Path ProtocolD . Neighbor Discovery ProtocolView AnswerAnswer: B
Which access layer threat-mitigation technique provides security based on identity?
Which access layer threat-mitigation technique provides security based on identity?A . using a non-default native VLANB . Dynamic ARP InspectionC . DHCP snoopingD . 802.1xView AnswerAnswer: D
Which command set meets the requirement?
Refer to the exhibit. An administrator must turn off the Cisco Discovery Protocol on the port configured with last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?A . interface gi0/1 no cdp enableB . interface gi0/1 clear cdp tableC . interface gi0/0 no cdp runD ....
Which command must be executed for Gi1/1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?
Refer to the exhibit. Which command must be executed for Gi1/1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?A . switchport mode trunkB . switchport mode dot1-tunnelC . switchport mode dynamic autoD . switchport mode dynamic desirableView AnswerAnswer: D
What are network endpoints?
What are network endpoints?A . a threat to the network if they are compromisedB . support inter-VLAN connectivityC . act as routers to connect a user to the service prowler networkD . enforce policies for campus-wide traffic going to the internetView AnswerAnswer: A
What is a characteristic of cloud-based network topology?
What is a characteristic of cloud-based network topology?A . physical workstations are configured to share resourcesB . services are provided by a public, private, or hybrid deploymentC . onsite network services are provided with physical Layer 2 and Layer 3 componentsD . wireless connections provide the sole access method to...
Which two primary drivers support the need for network automation? (Choose two)
Which two primary drivers support the need for network automation? (Choose two)A . Increasing reliance on self-diagnostic and self-healingB . Eliminating training needsC . Policy-derived provisioning of resourcesD . Reducing hardware footprintE . Providing a ship entry point for resource provisioningView AnswerAnswer: C E
Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?
Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?A . WREDB . FIFOC . PQD . WFQView AnswerAnswer: C
What does physical access control regulate?
What does physical access control regulate?A . access to specific networks based on business functionB . access to servers to prevent malicious activityC . access to computer networks and file systemsD . access to networking equipment and facilitiesView AnswerAnswer: D
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)A . TelnetB . SSHC . HTTPD . HTTPSE . TFTPView AnswerAnswer: A C